<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — Healthcare</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed-healthcare.xml" rel="self" type="application/rss+xml"/><description>Items affecting healthcare providers, hospitals, public health, medical devices.</description><language>en</language><lastBuildDate>Sun, 10 May 2026 19:33:31 +0000</lastBuildDate><item><title>Groupe 3R (Réseau Radiologique Romand) — Akira ransomware claims 48 GB; 20 imaging centres across seven Swiss cantons, second attack in twelve months</title><link>https://ctipilot.ch/briefs/2026-05-10/groupe-3r-r-seau-radiologique-romand-akira-ransomware-claims-48-gb-20-imaging-ce/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/groupe-3r-r-seau-radiologique-romand-akira-ransomware-claims-48-gb-20-imaging-ce/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>ransomware</category><category>organized-crime</category><category>data-breach</category><category>switzerland</category><description><![CDATA[<p>Akira listed Groupe 3R on its dark-web leak site on approximately 2026-05-08, claiming an attack dated 2026-04-30 and threatening release of 48 GB including employee identity documents (passports, driving licences, national IDs), patient records (addresses, phone numbers, medical data), payment information, and signed NDAs (<a href="https://www.groupe3r.ch/fr/information-importante-perturbation-de-nos-services-7268/" target="_blank" rel="noopener noreferrer">Groupe 3R victim statement, 2026-04-30</a> · <a href="https://www.ictjournal.ch/news/2026-05-06/le-reseau-radiologique-romand-a-nouveau-victime-dune-cyberattaque-ses-systemes" target="_blank" rel="noopener noreferrer">ICTjournal.ch, 2026-05-06</a> · <a href="https://www.blick.ch/fr/suisse/romande/cyberattaque-le-groupe-romand-3r-de-radiologie-cible-id21930477.html" target="_blank" rel="noopener noreferrer">Blick.ch, 2026-05-07</a>). Groupe 3R operates 20 medical-imaging centres across seven Romandie cantons (Vaud, Valais, Fribourg, Genève, Neuchâtel, Berne, and a further canton listed in the operator statement) — making this a direct Swiss critical-health-infrastructure incident. The operator confirmed the attack publicly via its own website on 2026-04-30, notified the Federal Office for Cybersecurity (BACS/OFCS), filed a criminal complaint, and explicitly stated it will not pay ransom. Legacy examination data remains inaccessible at the time of the public update; new examination data security has been restored on rebuilt infrastructure. Data-exfiltration was not confirmed by the victim; Akira&#39;s leak-site post asserts 48 GB exfiltrated. The operator&#39;s own statement notes this is its second cyberattack within twelve months and characterises the prior April 2025 incident as having involved different attackers and methodology.</p>]]></description><content:encoded><![CDATA[<p>Akira listed Groupe 3R on its dark-web leak site on approximately 2026-05-08, claiming an attack dated 2026-04-30 and threatening release of 48 GB including employee identity documents (passports, driving licences, national IDs), patient records (addresses, phone numbers, medical data), payment information, and signed NDAs (<a href="https://www.groupe3r.ch/fr/information-importante-perturbation-de-nos-services-7268/" target="_blank" rel="noopener noreferrer">Groupe 3R victim statement, 2026-04-30</a> · <a href="https://www.ictjournal.ch/news/2026-05-06/le-reseau-radiologique-romand-a-nouveau-victime-dune-cyberattaque-ses-systemes" target="_blank" rel="noopener noreferrer">ICTjournal.ch, 2026-05-06</a> · <a href="https://www.blick.ch/fr/suisse/romande/cyberattaque-le-groupe-romand-3r-de-radiologie-cible-id21930477.html" target="_blank" rel="noopener noreferrer">Blick.ch, 2026-05-07</a>). Groupe 3R operates 20 medical-imaging centres across seven Romandie cantons (Vaud, Valais, Fribourg, Genève, Neuchâtel, Berne, and a further canton listed in the operator statement) — making this a direct Swiss critical-health-infrastructure incident. The operator confirmed the attack publicly via its own website on 2026-04-30, notified the Federal Office for Cybersecurity (BACS/OFCS), filed a criminal complaint, and explicitly stated it will not pay ransom. Legacy examination data remains inaccessible at the time of the public update; new examination data security has been restored on rebuilt infrastructure. Data-exfiltration was not confirmed by the victim; Akira&#39;s leak-site post asserts 48 GB exfiltrated. The operator&#39;s own statement notes this is its second cyberattack within twelve months and characterises the prior April 2025 incident as having involved different attackers and methodology.</p>
<p>Akira&#39;s documented playbook against European healthcare and small-to-mid enterprise targets emphasises edge-device initial access (Cisco ASA / FTD CVEs, Fortinet SSL-VPN CVEs, VMware ESXi authenticated RCE) and intermittent file-encryption to evade EDR file-IO heuristics; ATT&amp;CK techniques observed across recent Akira incidents include <a href="https://attack.mitre.org/techniques/T1190/" target="_blank" rel="noopener noreferrer">T1190 Exploit Public-Facing Application</a>, <a href="https://attack.mitre.org/techniques/T1133/" target="_blank" rel="noopener noreferrer">T1133 External Remote Services</a>, <a href="https://attack.mitre.org/techniques/T1486/" target="_blank" rel="noopener noreferrer">T1486 Data Encrypted for Impact</a>, and <a href="https://attack.mitre.org/techniques/T1567/" target="_blank" rel="noopener noreferrer">T1567 Exfiltration Over Web Service</a>.</p>
<p><strong>Defender takeaway:</strong> Swiss and DACH healthcare operators with internet-exposed Cisco ASA/FTD, Fortinet SSL-VPN, or VMware ESXi management interfaces should validate that all 2025–2026 Akira-targeted CVEs are patched, that EDR rules trigger on intermittent-encryption file-IO patterns (write-then-skip-then-write of fixed-block ranges), and that radiology-modality VLANs are network-segmented from corporate AD; PACS/RIS environments tend to co-tenant with Windows file shares, providing trivial east-west reach once an attacker lands. Imaging operators that depend on a single ransomware-targeted partner should review business-continuity arrangements: this is the second 3R outage inside a year and referrers will already have continuity questions.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.groupe3r.ch/fr/information-importante-perturbation-de-nos-services-7268/" target="_blank" rel="noopener noreferrer">Groupe 3R victim statement, 2026-04-30</a> · <a class="src-additional" href="https://www.ictjournal.ch/news/2026-05-06/le-reseau-radiologique-romand-a-nouveau-victime-dune-cyberattaque-ses-systemes" target="_blank" rel="noopener noreferrer">ICTjournal.ch, 2026-05-06</a> · <a class="src-additional" href="https://www.blick.ch/fr/suisse/romande/cyberattaque-le-groupe-romand-3r-de-radiologie-cible-id21930477.html" target="_blank" rel="noopener noreferrer">Blick.ch, 2026-05-07</a></span></aside>]]></content:encoded></item><item><title>Validate Akira-targeted edge-device CVE patch state in CH/EU healthcare</title><link>https://ctipilot.ch/briefs/2026-05-10/validate-akira-targeted-edge-device-cve-patch-state-in-ch-eu-healthcare/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/validate-akira-targeted-edge-device-cve-patch-state-in-ch-eu-healthcare/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>ransomware</category><category>organized-crime</category><category>switzerland</category><category>europe</category><description><![CDATA[<p>Swiss and DACH healthcare operators (and any organisation operating PACS/RIS or radiology-modality networks) should re-validate patch state on Cisco ASA / FTD, Fortinet SSL-VPN, and VMware ESXi management interfaces, and confirm radiology-modality VLAN segmentation from corporate Active Directory. Confirm EDR rules trigger on intermittent file-encryption file-IO patterns. Review business-continuity contracts for ransomware-targeted single-supplier dependencies (the second 3R outage in twelve months will already have referrer-side continuity questions).</p>]]></description><content:encoded><![CDATA[<p>Swiss and DACH healthcare operators (and any organisation operating PACS/RIS or radiology-modality networks) should re-validate patch state on Cisco ASA / FTD, Fortinet SSL-VPN, and VMware ESXi management interfaces, and confirm radiology-modality VLAN segmentation from corporate Active Directory. Confirm EDR rules trigger on intermittent file-encryption file-IO patterns. Review business-continuity contracts for ransomware-targeted single-supplier dependencies (the second 3R outage in twelve months will already have referrer-side continuity questions).</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.groupe3r.ch/fr/information-importante-perturbation-de-nos-services-7268/" target="_blank" rel="noopener noreferrer">Groupe 3R victim statement, 2026-04-30</a></span></aside>]]></content:encoded></item><item><title>Swiss and DACH Deployment Context</title><link>https://ctipilot.ch/briefs/2026-05-09/swiss-and-dach-deployment-context/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/swiss-and-dach-deployment-context/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>vulnerabilities</category><category>pre-auth</category><category>rce</category><category>auth-bypass</category><category>patch-available</category><category>zero-click</category><category>switzerland</category><category>dach</category><description><![CDATA[<p>SEPPmail is the market-leader for cryptographic email processing in the Swiss public sector. The primary driver is cantonal administrative requirements under the Federal Act on Data Protection (nFADP/DSG, effective 1 September 2023) and cantonal healthcare data legislation mandating encrypted transmission of personal health information. NCSC-CH advisory 12551 was published in response to this cluster; any Swiss federal body, cantonal administration, or healthcare provider running SEPPmail should treat this as a mandatory same-day response event. The Swiss Federal Chancellery&#39;s ICT security baseline for federal agencies (Sicherheitsstandard IKT des Bundes, ISBB) classifies email gateway compromise as a Level 3 incident requiring escalation to NCSC-CH within 24 hours.</p>]]></description><content:encoded><![CDATA[<p>SEPPmail is the market-leader for cryptographic email processing in the Swiss public sector. The primary driver is cantonal administrative requirements under the Federal Act on Data Protection (nFADP/DSG, effective 1 September 2023) and cantonal healthcare data legislation mandating encrypted transmission of personal health information. NCSC-CH advisory 12551 was published in response to this cluster; any Swiss federal body, cantonal administration, or healthcare provider running SEPPmail should treat this as a mandatory same-day response event. The Swiss Federal Chancellery&#39;s ICT security baseline for federal agencies (Sicherheitsstandard IKT des Bundes, ISBB) classifies email gateway compromise as a Level 3 incident requiring escalation to NCSC-CH within 24 hours.</p>
<p>For DACH-region organisations: BSI IT-Grundschutz includes email encryption gateways in the APP.4.4 component scope; a known RCE cluster in such a gateway qualifies for an extraordinary IT-Grundschutz gap notification under ISMS procedures.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://security-hub.ncsc.admin.ch/api/posts/12551/details" target="_blank" rel="noopener noreferrer">NCSC-CH Security Hub post 12551, 2026-05-08</a> · <a class="src-additional" href="https://downloads.seppmail.com/extrelnotes/150/ERN15.0.html#security" target="_blank" rel="noopener noreferrer">SEPPmail release notes v15.0</a></span></aside>]]></content:encoded></item></channel></rss>